Identity Security for Software Development Audiolibro Por John Walsh, Uzi Ailon, Matt Barker arte de portada

Identity Security for Software Development

Best Practices That Every Developer Must Know

Reserva: Pruébalo por $0.00
Prime logotipo Exclusivo para miembros Prime: ¿Nuevo en Audible? Obtén 2 audiolibros gratis con tu prueba.
Elige 1 audiolibro al mes de nuestra inigualable colección.
Escucha todo lo que quieras de entre miles de audiolibros, Originals y podcasts incluidos.
Accede a ofertas y descuentos exclusivos.
Premium Plus se renueva automáticamente por $14.95 al mes después de 30 días. Cancela en cualquier momento.

Identity Security for Software Development

De: John Walsh, Uzi Ailon, Matt Barker
Narrado por: Tom Perkins
Reserva: Pruébalo por $0.00

$14.95 al mes después de 30 días. Cancela en cualquier momento.

Resérvalo en preventa por $13.99

Resérvalo en preventa por $13.99

Confirmar precompra
la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.
Cancelar

Acerca de esta escucha

Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.

In this practical book, authors John Walsh, Uzi Ailon, and Matt Barker provide conceptual frameworks, technology overviews, and useful code snippets to bridge the gap between development, IT, and security to integrate robust identity security across apps, CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, process automation, IoT, and more. You'll learn:

● What developers need to know about managing secrets and identity to build safer apps

● What machine identities, secrets, and credentials are—and how to secure them

● How to secure the software supply chain to build safer apps

● How identity security fits into modern software development practices

©2025 O'Reilly Media, Inc. (P)2025 Ascent Audio
Programación Seguridad y Cifrado
adbl_web_global_use_to_activate_T1_webcro805_stickypopup
Todavía no hay opiniones